WO2012160114A1 - Application pour dispositif informatique portable - Google Patents

Application pour dispositif informatique portable Download PDF

Info

Publication number
WO2012160114A1
WO2012160114A1 PCT/EP2012/059640 EP2012059640W WO2012160114A1 WO 2012160114 A1 WO2012160114 A1 WO 2012160114A1 EP 2012059640 W EP2012059640 W EP 2012059640W WO 2012160114 A1 WO2012160114 A1 WO 2012160114A1
Authority
WO
WIPO (PCT)
Prior art keywords
application
missing
photograph
computing device
person
Prior art date
Application number
PCT/EP2012/059640
Other languages
English (en)
Inventor
Stephen Gary JONES
Original Assignee
C This Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from GBGB1108590.9A external-priority patent/GB201108590D0/en
Priority claimed from GBGB1117495.0A external-priority patent/GB201117495D0/en
Application filed by C This Limited filed Critical C This Limited
Publication of WO2012160114A1 publication Critical patent/WO2012160114A1/fr

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B27/00Alarm systems in which the alarm condition is signalled from a central station to a plurality of substations
    • G08B27/006Alarm systems in which the alarm condition is signalled from a central station to a plurality of substations with transmission via telephone network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72418User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services
    • H04M1/72424User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services with manual activation of emergency-service functions

Definitions

  • the invention generally relates to the field of telecommunications and a computerised apparatus and method for publicizing an incident such as the loss of a person from another person's care.
  • Apple's iPhones are by far and away the most popular smart phone on the UK market.
  • the Apple iPhone has the ability to hold computer programs that perform simple functions; these are called apps. They are available from the Apple store via i-tunes which is a Mac computer based online store. Microsoft based computers can also access i-tunes. Stringent criteria have to be met. These apps are then available for download onto other smart phones such as those manufactured by Samsung or LG, etc.
  • Apple has just launched the new Mac O/S 5 that allows you to place 'to do notes' that relate to a location. For example, if you want to remember to put the rubbish bin out in the yard when you get home; upon entering your home (GPS located) a message will be sent to your message box on the smart phone reminding you to put the rubbish bin out - quite clever.
  • An objective of the invention is to address one or more of the above problems. For example, a "Kids in Safe Hands" application may allow a parent to alert the public of a missing child so that the child can be found and reunited with their parents more quickly.
  • Some examples relate to systems and methods for a remote mobile device to download a software application and then transmit data to a primary secure computing device.
  • the remote mobile device may transmit multimedia to the primary secure computing device and transmit combined data and multimedia to a second remote computing device for display on remote digital screens.
  • the multimedia data displayed on the remote mobile device may be securely authenticated upon transmission requested by a user of the remote mobile device and manually checked upon the remote mobile device with security personnel at a GPRS licensed and registered location.
  • a proprietary streaming module may execute on a mobile device to stream multimedia and data via the internet.
  • the stream may be established instantaneously between the mobile device and a remote primary computing machine when required.
  • the remote primary computing machine may associate the multimedia with stored data and forwards the multimedia with predetermined and variable messaging to a digital presentation application that is executing on a remote second computing machine.
  • the mobile device application may be activated by the user of the mobile device.
  • the mobile device application may remain activated pending further stimulus when entering a GPRS recognised location whereupon the mobile device application can activate to a higher status for multimedia and data transmission instantaneously by the user of the mobile device.
  • the higher status may remain within the perimeters of the GPRS recognised location.
  • the mobile device may revert to a lower activated status.
  • the mobile device user may de-activate the mobile device application at any time upon entering the mobile device locking code.
  • an application for a portable computing device configured to:
  • a user interface configured to receive input indicative of at least one of the one or more persons going missing
  • the user interface may be configured to receive: user input indicative of which one or more persons have gone missing; and a security input, such as a passcode or confirmation of acceptance of penalties for false alarms, to confirm the user input.
  • the application may be configured to prevent transmission of data until the security input has been correctly entered.
  • the application may be configured to receive location information, such as GPRS or GPS information, of the portable computing device and activate or deactivate some or all of the functionality of the application in accordance with a current location of the portable computing device.
  • location information such as GPRS or GPS information
  • the application may be configured to use first location information (such as GPRS) when the distance between a current location and a nearest registered venue is greater than a threshold (for example 500 m).
  • the application may be configured to use second location information (such as GPS) when the distance between a current location and the nearest registered venue is less than the threshold. In this way, efficient use of the battery of the portable computing device can be made.
  • the application may be configured to only be able to provide the user interface and/or transmit data representative of the photograph when a current location of the portable computing device satisfies one or more predetermined criteria.
  • the application may be configured to prevent the provision of the user interface and/or prevent the transmission of data representative of the photograph when a current location of the portable computing device does not satisfy one or more predetermined criteria.
  • Such predetermined criteria may be an indication that the portable computing device is within the bounds of a pre-registered location/venue (such as a theme park, shopping mall, supermarket or any other environment that is known to have display screens that can display the photograph of the missing person).
  • the application may be configured to disable the user interface and/or prevent transmission of data representative of the photograph when a current location of the portable computing device does not satisfy one or more predetermined criteria.
  • the transmitted data may also be configured to display personal details of the missing person (such as name, height, hair colour, age, or any other personal characteristics) with the photograph on the one or more screens, CCTV and other registered smart phone devices.
  • the transmitted data may also be configured to display emergency contact information for a third party to use if they see the missing person.
  • the transmitted data may be configured to display the photograph concurrently with information that was previously being displayed on the screen, for example the photograph could be displayed alongside an advertisement.
  • a portable computing device comprising:
  • a memory configured to store details of one or more persons, including a photograph of each person;
  • a user interface configured to receive input indicative of at least one of the one or more persons going missing
  • a transmitter configured to transmit data representative of a photograph of the at least one missing person from memory upon receipt of the input indicative of a person going missing
  • the transmitted data is configured to display the photograph of the at least one missing persons on one or more screens, CCTV and registered smart phones in the vicinity of the portable electronic device.
  • Any portable computing device disclosed herein may have any application disclosed herein stored in memory.
  • the portable computing device may also comprise a processor configured to process the application from memory.
  • a system comprising: a remote computing machine; and
  • the portable computing device comprising:
  • a memory configured to store details of one or more persons, including a photograph of each person;
  • a user interface configured to receive input indicative of at least one of the one or more persons going missing
  • a transmitter configured to transmit data representative of a photograph of the at least one missing person from memory upon receipt of the input indicative of a person going missing to the remote computing machine
  • the remote computing device is configured to receive the transmitted data from the portable computing device and cause the photograph of the at least one missing person to be displayed on one or more screens in the vicinity of the portable electronic device.
  • the details of the one or more persons may be stored on memory associated with the remote computing machine instead of or as well as the memory of the portable computing device.
  • the transmitter of the remote computing device may be configured to transmit data representative of the input indicative of at least one of the one or more persons going missing instead of data representative of a photograph of the at least one missing person.
  • the remote computing device may be configured to display emergency contact information for a third party to use if they see the missing person along with the photograph of the missing person.
  • the remote computing device which may be associated with the location (such as theme park) in which the portable computing device is being used, can append the emergency contact information for that specific location/venue.
  • the remote computing device may be a server that is configured to control one or more display screens, CCTV and registered smart phones in a venue/location. In this way, no significant changes are required to the existing hardware/infrastructure that is used to display information such as advertisements throughout the venue.
  • An application, or app, in accordance with the present invention may automatically activate each time the user goes into a venue registered with the system.
  • the app may arrange to show a child's photograph and identification details on digital TV screens, CCTV and registered smart phones within or around a venue within moments of a parent raising the alarm.
  • digital display screens may be used to immediately alert anyone in a venue to a 'lost child panic' within moments of a child going missing.
  • Embodiments of the present invention may allow registered public places to put out an alert immediately after a parent fears their child may have gone missing.
  • Registered public places may comprise organisations such as shopping centres or leisure park operators and other public venues via the installation of this system.
  • iPhone smart phone
  • mobile phone hand held device
  • mobile smart phone and portable computer may be used interchangeably.
  • parent, guardian, grandparent, carer and responsible adult are also used interchangeably, as are the terms child, grandchild, minor, charge.
  • Figures 1 to 16 show various screenshots of an application
  • Figure 17 illustrates a panic flow chart
  • Figure 18 illustrates the interaction between various systems that can operate in accordance with the present invention.
  • Figure 19 shows a screenshot from a device in accordance with the present invention.
  • Child abduction is every parent's worst fear. Some embodiments provide parents with an immediate tool to raise the alarm if they lose track of their child. Upon panic, a photographic image and associated information will appear on the digital display screen within seconds. Speed is often of the essence in the search to reunite a missing child with their parent.
  • Embodiments of the invention enable the dissemination of information regarding lost or kidnapped individuals, such as children.
  • child abduction is now becoming more common and possibly endemic (the worldwide economic position may mean kidnapping of children from more wealthy families becomes more prevalent, even in the west).
  • Products in accordance with various embodiments reduces the risk of loss during every day activity, such as shopping and leisure. Many children show no fear. They are still inquisitive and vulnerable. Many predators know this. An immediate response to the threat of losing children from the care of a responsible adult is required.
  • Embodiments of the present invention may be provided within software package that has the potential to protect the UK's children from the threat of abduction. This produce is called "Kids in Safe Hands”.
  • An app may be downloaded onto the smart phone for a fee from a distributer, such as the Apple app store, by the owner of the smart phone.
  • a distributer such as the Apple app store
  • Each smart phone can have a unique reference identifying the registered owner.
  • Such data may be stored as a cookie, as is known in the art.
  • a recent photograph of the smart phone's owner may be held on the smart phone along with that of a child they wish to protect.
  • this information may be stored on a different device such as a remote server. Additional data can be recorded such as eye colour, height, hair colour, name and then a description of the clothes they are wearing.
  • the app may have a panic button on the smart phone which can be red in colour.
  • This app can be activated when entering a cthis Limited Child Safe Zone.
  • Child Safe Zones can be identified by a marker, such as a sticker placed on a window or door at entry points to a venue.
  • This panic button can have a unique sliding action. Sliding the button can activate the panic button. The colour can change to amber or green in readiness for immediate use if a panic happens. When the panic button is pressed, again a slide action, the colour will change to green.
  • identity data detailing the child on the smart phone is transferred to the cthis Limited database, which may be cloud based for security reliability.
  • the smart phone Upon immediate verification as a registered user, the smart phone is located by GPS and the identity data may be transmitted to a digital screen network (whether it is cthis or another supplier).
  • the advertisement can be removed or partially removed (to avoid conflict of contractual advertising thereby avoiding any change of the public sites contract with their advertising company/agency).
  • the operator of the public location may have the same identity data sent to their digital mobile handheld devices. These mobile handheld devices may be held by security staff. When a panic is raised the smart phone button turns to red by being pressed by a user; ail exits may be immediately manned (and closed-off) to ensure that the missing child does not get out of the public place.
  • Display screens, in the venue may display a message comprising an image of the child and a request to contact the venue proprietors if the child is found.
  • the CCTV security control centre may receive the image and information; this information may then be passed on to registered smart phone devices.
  • the user may type in further information with the child's current description (e.g. clothing).
  • the security control centre may send information to the User smart phone as updates on progress in finding the missing child.
  • the child may use their mobile phone to call security at the venue (or any other contact names on the display screens).
  • the security staff may have access to GPS location information that identifies where the call was made.
  • the child may then be reunited with the parent if the smart phone owner is able to show the photograph of themselves with their child. If this photo matches the appearance of the child the panic is over and the smart phone panic button can be pressed to revert to an active non-panic state (green).
  • the fourth panic may trigger an automatic payment, £50 for example, to a cthis payment system (optionally not bank details but phone number account).
  • the owner of the product may take the option to close the account until further notice, by Email.
  • the parent leaves the cthis Child Safe Zone, they may deactivate the panic button until it is required again.
  • the rules of the app may say that 'the owner of the iPhone must ensure that they register the child(ren) with photographic ID and also of the iPhone owner and the child(ren)'.
  • the panic is cancelled. This can be done by the parent, or guardian, or the security service, whilst at the Venue.
  • the information required is stored on a very secure computer server. Images of the children may be stored on the iPhone by the iPhone owner. They are not matched and checked until a panic situation occurs. This process may or may not be automatic, using face recognition technology.
  • Battery draining is a renowned problem.
  • the app will be 'live' as a background function at all times the smart-phone is turned on, checking its location co-ordinates using the mobile mast network; these are accurate to about 500 metres.
  • the location function switches from the mobile mast to GPS which may have a 5 metre location accuracy. This will remain active whilst in the Child Safe Zone.
  • the smart-phone enters the Child Safe Zone it automatically activates the app in readiness for a 'panic'.
  • the latest approved and registered photograph on the smart phone can be automatically loaded into the cthis server to cater for the lower bandwidth networks (2g etc).
  • the image is held on the server until the parent leaves the Child Safe Zone whereupon the app checks if it enters a new Child .Safe Zone and, if not, the app is deactivated and a notification is sent that the image is to be removed from the server.
  • Other detail about the child may be held on the cthis server upon registration. This has two major benefits. The first is that the sensitive data of image and detail is not related until a panic occurs; the second is that this will decrease the chances of misuse.
  • Cthis Limited may not punish the smart-phone owner with a penalty charge because they would have to register their card or other payment details (although there are new cards coming out that avoids this). Any misuse can prompt cthis Limited to cease the account. This will be explained at registration. Potential misuse by youths should be limited by this arrangement.
  • Embodiments of the invention may also allow multiple children to be imaged on the smart-phone. This may be useful during school outings.
  • a configuration screen will be displayed, as shown in Figure 1.
  • the user will have to accept terms and conditions of use and tick the box. Declining will cause a modal box to appear informing the user that they must accept the terms and conditions. The user will have to fill out this form before they proceed through to a functional app.
  • the user will be asked how many children they have. This can help streamline the setup process. They may also be requested to setup a passcode so that any changes may be made in the future.
  • the user may then be requested to fill in additional information about their child.
  • the user can tap the 'next' button and dependant on the number of children selected during the configuration period the app will either go to the next stage, or loop back to the add a child stage until all children have been added. This allows the user to setup the app from the beginning without having to go through further menu systems, alleviating any user confusion.
  • the option to add a new child to the alarm list with a simple drag and drop action Raise the alarm quickly and easily by having a large 'raise alarm' button.
  • Figure 5 illustrates adding a simple and intuitive method of adding a new child to the application.
  • the user will simply click on the add child button, the next screen will ask for an app passcode (this can be setup in configuration). Once this has been entered the app will go back into the add child screen as featured in the initial configuration.
  • Figure 6 shows screen shots illustrating adding a child to the raise alarm area using a simple drag action; dragging the child from the top storage menu to the bottom raise alarm area. To add multiple children, drag the new child over the child already there, this will then split to show there is more than one child there; a red notification will also display to show how many children are in the alarm area. Once a child has been added to the alarm area the raise alarm button will change colour to notify the user it is ready to be used.
  • a modal screen will appear warning the user of making a false alarm, there may be the option to cancel or continue.
  • Cancelling can send the user back to the Alarm screen, continuing can send the user into the control centre.
  • the user may be able to add a current description of the lost child and send this directly to the control room.
  • the user can also get updates from the control room. This can result in 'haptic' feedback being given.
  • deleting a child from the alarm uses the same gesture as adding, drag the child from the alarm area back into the holding area. Dragging the icon from the alarm area may enlarge the image so the user can see they have the correct child selected.
  • Figure 9 illustrates deleting a child from the app completely. This feature utilises already used and known gestures within iOS. In this step the user will press down on the child's icon for several seconds, the icon will then start to wiggle and display a small x in the top right corner, hitting this x will pop up a passcode screen, after entering the passcode the child' s icon will disappear.
  • Figure 11 illustrates a screenshot of a child with a description provided below it.
  • the information page displays information about the app, FAQ's and contact information.
  • a separate menu allowing specific children to be selected. This may be appropriate when the user needs to add descriptions for multiple children.
  • Figure 15 shows an example of an overlaid tutorial; this may be accessible from the information tab but may also display on the first running of the app.
  • Figure 16 shows another example that may only be displayed when selected through the information app. When the user goes to the control centre they will not want to be hindered by an overlay.
  • Figure 17 illustrates a flow chart for a procedure for processing a panic requests. Initially, a decision is taken whether the request is a "start, stop or query". If the request is a query the panic status is returned by the server and the process ends. If the request is to stop the panic the system determines if the panic has already been stopped. If it has not already been stopped the venue where the child was lost is notified of the change of status. If the panic has already been stopped the server determines if the panic was stopped by the venue and returns status information to the device.
  • the server determines if a panic has already been started. If a panic is already on going the server returns the panic status to the device. If there has not yet been a panic, the server initiates a panic if the credential details presented by the smart phone are valid. This can comprise alerting the venue and dispatching data for display in the venue.
  • Figure 18 illustrates the interaction between the various systems that can operate in accordance with the present invention.
  • the figure is separated into two areas: the venue on the left hand side, and the remote primary computing machine on the right hand side.
  • a mobile device in the venue communicates with the remote primary computing machine via a telecommunications network which can comprise the internet.
  • Cell phone base station information can be used to determine the position of the mobile device, and if it falls within a registered venue, a 'Child Safe Zone'.
  • GPS can be used to provide a location estimate of the mobile device, if the mobile device has access to GPS.
  • the remote primary computing machine can communicate with a remote secondary computing machine via a network.
  • the remote secondary computing machine can provide information, such as data to be displayed on visual screens on advertising boards in response to receiving data from remote primary computing machine.
  • the content of the digital screens can also be at least partially modified the remote secondary computing machine taking instructions from an operator situated locally to the machine.
  • FIG 19 shows a screenshot from a device in accordance with the present invention. This screenshot corresponds to those of Figures 8 and 9.
  • the mobile device in communication with the remote primary computing machine via the internet, the method comprising: streaming, by the mobile device application, multimedia data to the remote primary computing machine via the internet, the multimedia data generated by a multimedia application with the remote mobile device and comprising input to a presentation application executing on the remote secondary computing machine via a secure primary computing machine with proprietary application for control and authentication and security of transmission of multimedia data and messaging.
  • streaming further comprises streaming the multimedia data responsive to receiving a request to execute the presentation application from a user of the remote mobile device.
  • streaming further comprises transmitting, by a local streaming module executing on the remote mobile device, the multimedia data to the remote secure primary computing machine via the internet.
  • a remote mobile device for use in a proprietary system in which multimedia data generated by the remote mobile device is displayed on a remote digital screen by an application executing on a remote secondary computing machine, the remote mobile device comprising: a multimedia interface sends the multimedia data comprising input to a presentation application executing on a remote secondary computing machine via the remote secure primary computing machine to authenticate the multimedia data before display via the internet.
  • the secondary computing machine receiving, from the remote primary computing machine, authenticated multimedia output generated by the remote mobile device application responsive to a stimulus by the remote mobile device user.
  • a remote mobile device for use in a system in which multimedia data generated by a multimedia application connected via the remote secure primary computing machine to the remote secondary computing machine computing is displayed on the remote digital screen by an application executing on a remote secondary computing machine, the remote mobile device comprising: means for streaming, by the remote mobile device, multimedia data to a remote secondary computing machine via the internet, the multimedia data generated by the remote mobile device and comprising input to a presentation application executing on the remote secondary computing machine.
  • the remote mobile device for use in a proprietary system is activated by GPRS stimulus executed by authenticated data on the proprietary application on the remote secure primary computing machine.
  • the system of example 14 further comprises the proprietary application on the remote mobile device to recognise the GPRS location and activate to a higher status for user execution of a function within the proprietary application.
  • the remote mobile device holds the original multimedia data displayed on the remote digital screens for authentication by the remote mobile device user with security personnel at a GPRS approved location.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

L'invention concerne une application destinée à un dispositif informatique portable, l'application étant configurée pour : inviter un utilisateur à saisir des détails concernant une ou plusieurs personnes, notamment une photographie de chaque personne ; fournir une interface utilisateur configurée pour recevoir une saisie indiquant qu'au moins l'une desdites personnes est manquante ; transmettre des données représentatives d'une photographie de ladite personne manquante lors de la réception de la saisie indiquant qu'une personne est manquante ; les données transmises étant configurées pour afficher la photographie desdites personnes manquantes sur un ou plusieurs écrans au voisinage du dispositif électronique portable.
PCT/EP2012/059640 2011-05-23 2012-05-23 Application pour dispositif informatique portable WO2012160114A1 (fr)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
GBGB1108590.9A GB201108590D0 (en) 2011-05-23 2011-05-23 Smartphone panic button
GB1108590.9 2011-05-23
GB1117495.0 2011-10-11
GBGB1117495.0A GB201117495D0 (en) 2011-10-11 2011-10-11 An application for a portable computing device

Publications (1)

Publication Number Publication Date
WO2012160114A1 true WO2012160114A1 (fr) 2012-11-29

Family

ID=46172785

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2012/059640 WO2012160114A1 (fr) 2011-05-23 2012-05-23 Application pour dispositif informatique portable

Country Status (1)

Country Link
WO (1) WO2012160114A1 (fr)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6401095B1 (en) * 1999-09-21 2002-06-04 Robert M. Adler Geographically sensitive automated notice system
US20050086261A1 (en) * 2003-10-20 2005-04-21 Richard Mammone Child locator apparatus and method
US20090125230A1 (en) * 2007-11-14 2009-05-14 Todd Frederic Sullivan System and method for enabling location-dependent value exchange and object of interest identification

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6401095B1 (en) * 1999-09-21 2002-06-04 Robert M. Adler Geographically sensitive automated notice system
US20050086261A1 (en) * 2003-10-20 2005-04-21 Richard Mammone Child locator apparatus and method
US20090125230A1 (en) * 2007-11-14 2009-05-14 Todd Frederic Sullivan System and method for enabling location-dependent value exchange and object of interest identification

Similar Documents

Publication Publication Date Title
US10861307B2 (en) Systems and methods for monitoring for and preempting pre-identified restriction violation-related behavior(s) of persons under restriction
US11388546B2 (en) Systems and methods for monitoring for and lowering the risk of addiction-related or restriction violation-related behavior(s)
US9787823B2 (en) System and method for remotely controlling features of wireless mobile devices
CN104012133B (zh) 移动设备安全驾驶
JP6386646B2 (ja) 移動通信端末機の活性化時に,特定動作が行われるようにするための方法,システム及び移動通信端末機
US8559914B2 (en) Interactive personal surveillance and security (IPSS) system
US20230388750A1 (en) Personal monitoring using a remote timer
US11412353B2 (en) Systems and methods for monitoring for and preempting the risk of a future occurrence of a quarantine violation
CA2958087C (fr) Systeme et procede d'informations de medicament
US11743433B2 (en) Event identification and notification via an automation hub
US20160266733A1 (en) Event and staff management systems and methods
US20160027292A1 (en) Security and Public Safety Application for a Mobile Device
US10109173B2 (en) Person of interest location confirmation system
US20140366421A1 (en) System and methods for firearm safety enhancement
US20110227730A1 (en) System and apparatus for locating and surveillance of persons and/or surroundings
CN102917115A (zh) 防止和/或限制移动设备的使用的系统和方法
US10672265B2 (en) Vehicle identification system and method
US20190378185A1 (en) Entertainment quality control device and program
US20170193807A1 (en) Alarm system on a device connected to a network
WO2012160114A1 (fr) Application pour dispositif informatique portable
KR102118453B1 (ko) 비활동 감지를 이용한 피보호자 관리 시스템 및 그 방법
KR102157310B1 (ko) 피보호자 관리 시스템 및 그 방법
WO2017220364A1 (fr) Procédé et dipositif pour envoyer un message de danger déclenché par un utilisateur à un centre de messagerie
KR101678902B1 (ko) 신원 정보 확인 및 안전 확보 시스템
WO2021076069A1 (fr) Application de violation de règle de trafic et rapport de sinistre et son procédé

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12723863

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 07-03-2014)

122 Ep: pct application non-entry in european phase

Ref document number: 12723863

Country of ref document: EP

Kind code of ref document: A1